Useful Links
Technology
Computer science
Cybersecurity
Cybersecurity Threats and Vulnerabilities
Types of Threat Actors
Hackers
Script Kiddies
Use of premade scripts or tools
Limited technical expertise
Hacktivists
Motivated by political or social causes
Use of cyber tactics to spread messages or disrupt services
Black Hat Hackers
Engage in illegal cyber activities for profit
Exploit vulnerabilities for personal gain
White Hat Hackers
Ethical hackers who find and report vulnerabilities
Conduct security assessments for organizations
Grey Hat Hackers
Operate in the ambiguous area between white and black hat activities
May exploit vulnerabilities but inform victims afterward
Insider Threats
Malicious Insiders
Employees or contractors with intent to harm
Data theft or sabotage
Unintentional Insiders
Human errors leading to data breaches
Lack of cybersecurity awareness
Nation-State Actors
State-Sponsored Hackers
Targeted attacks on other nations or corporations
Use of advanced persistent threats (APTs)
Cyber Espionage
Stealing sensitive data for political or military advantage
Focus on critical infrastructure and governmental data
Cybercriminals
Organized Crime Groups
Highly organized and financially motivated
Ransomware campaigns and financial fraud
Lone Wolf Attackers
Individuals acting independently
May commit identity theft or credit card fraud
Vulnerability Management
Vulnerability Assessment
Identification of vulnerabilities in systems and networks
Use of automated tools and manual review
Importance of regular assessment scheduling
Penetration Testing
Ethical hacking to identify exploitable weaknesses
Simulation of real-world cyber attacks
Report findings to improve security measures
Patch Management
Regularly updating software to fix security vulnerabilities
Importance of timely patch deployment
Automated vs. manual patch management processes
Security Information and Event Management (SIEM)
Centralized logging and reporting of security events
Real-time analysis for threat detection
Integration with incident response workflows
Cyber Attack Vectors
Email
Phishing Attacks
Deceptive emails to steal credentials or deploy malware
Spear phishing targeting specific individuals or organizations
Business Email Compromise (BEC)
Fraudulent emails appearing to be from trusted sources
Targeted attacks on corporate emails for theft
Web
Drive-by Downloads
Unintentionally downloading malware from compromised websites
Use of malicious ads or links
Cross-Site Scripting (XSS)
Injection of scripts into web pages to exploit user data
Persistent vs. Non-persistent XSS
Mobile
Mobile Malware
Malicious software targeting mobile devices
Apps that request excessive permissions
SIM Swapping
Hijacking phone numbers to access accounts
Used for bypassing two-factor authentication
Internet of Things (IoT)
Device Vulnerabilities
Weak default credentials on IoT devices
Lack of firmware updates
Botnets
Network of compromised IoT devices used for massive attacks
Example: DDoS attacks exploiting IoT networks
Device management challenges in diverse environments
2. Cybersecurity Measures and Strategies
First Page
4. Cybersecurity in Specific Industries